Chapter Undergraduate 699 words Human Written

Critical Infrastructures and Cybersecurity

Last reviewed: ~4 min read Technology › Critical Infrastructure
80% visible
Read full paper →
Paper Overview

Cyber Terrorism Cybersecurity has emerged as one of the important components of modern security initiatives because of rapid advancements of technology and the Internet. Ensuring cybersecurity has become important because of the vulnerabilities of critical infrastructures to cyber attacks in the aftermath of the 9/11 terror attacks. As part of efforts to enhance...

Full Paper Example 699 words · 80% shown · Sign up to read all

Cyber Terrorism Cybersecurity has emerged as one of the important components of modern security initiatives because of rapid advancements of technology and the Internet. Ensuring cybersecurity has become important because of the vulnerabilities of critical infrastructures to cyber attacks in the aftermath of the 9/11 terror attacks. As part of efforts to enhance cybersecurity, federal and state governments in the United States have enacted laws that define the role of various stakeholders in protecting the nation's critical infrastructures.

These laws govern the responsibilities of companies and organizations in protecting themselves and customers. In addition, these regulations have some costs associated with them given that enhancing cybersecurity is a relatively complex process. Organizations' Role in Protecting Themselves and Customers As cyber attacks continue to increase in the recent past, the federal government has enacted laws and policies to govern the role of organizations in protecting themselves and customers.

Based on the executive order signed by President Obama in 2015, organizations need to establish cybersecurity infrastructures that prevent unauthorized acquisition or access to electronic data that comprises personal information (Heilbrun & Brown, 2011). Secondly, organizations are required to inform those affected by any data breach and the Federal Trade Commission within 48 hours after the occurrence of such an incidence. If the data breach affects at least 5,000 individuals, organizations are required to notify the major credit reporting bodies.

The executive order expanded the powers and authority of the Federal Trade Commission to penalize organizations or businesses for any failure to respond to theft and/or unauthorized access of personal information in a responsible and timely manner. Therefore, the role of organizations in protecting themselves and customers based on U.S. laws on cybersecurity involves preventing unauthorized access and notify relevant stakeholders of any data breaches.

Companies' Responsibilities Companies and businesses also play a crucial role in enhancing cybersecurity given that they have joined national initiatives towards improving transaction security (Aspen Publishers, 2015). One of the responsibilities of companies is to adopt more secure payment technologies, which act as indicators to customers that their protection of their electronic personal information is treated seriously. In this regard, companies are required to undertake appropriate measures to secure their own systems and provide more secure options to the customers.

Secondly, companies are faced with the need to enhance information sharing in order to improve response to incidents of data breaches and fraud. Third, companies should engage in strategic partnerships and alliances through which customers are provided with free monitoring of data breaches. Costs of Regulations There are various costs relating to these cybersecurity regulations, which are necessary for effective implementation of the laws. The costs of these regulations include transaction costs, coordination costs, and monitoring costs for implementing software and other critical infrastructures for cybersecurity (Schwalb, 2006).

However, these costs are minimal as compared to the financial implications brought by occurrence of data breaches. In conclusion, cybersecurity remains a crucial component of modern security infrastructure to an extent that laws have been established to promote cybersecurity. These laws define the responsibilities and roles of companies in protecting themselves and customers such as enhance information sharing, preventing identity theft, adoption of secure systems and technologies, and providing free monitoring and resolution of data breaches. These regulations are associated with some costs like monitoring, coordination, and transaction costs.

References Aspen Publishers. (2015, January). President Obama Signs Cybersecurity Executive.

140 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
4 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Critical Infrastructures And Cybersecurity" (2017, June 15) Retrieved April 21, 2026, from
https://www.paperdue.com/essay/critical-infrastructures-and-cybersecurity-2165575

Always verify citation format against your institution's current style guide.

80% of this paper shown 140 words remaining